Helio Loureiro

1,142 Flips | 2 Magazines | 83 Likes | 56 Following | 35 Followers | @helioloureiro | Transforming caffeine into programs

Living in a Docker world

How much do you know about containers?<p>Once upon a time, I worked at a startup that was looking to “Dockerize” its backend infrastructure. This developed into a running joke where the programmers on the team would ask me if I knew what Docker was, and I would say:<p>“Yes, it’s like a boat.”<p>This would …

DevOps

Mantenha-se responsável por sua produtividade

Essas seis dicas podem ajudá-lo a fazer mais com menor esforço<p>Se você resolveu parar de procrastinar e ser mais produtivo, suas melhores intenções …

Este pesquisador garante que as urnas eletrônicas são hackeáveis

Em teste promovido pelo TSE no ano passado, Diego Aranha mudou mensagem na tela da urna, alterou registros de votação e encontrou uma maneira de quebrar o sigilo do voto. Agora ele afirma que é possível fraudar eleições.<p>Faltava só uma horinha para Diego Aranha provar um ponto que defende há anos: …

Pornhub launches its own VPN

Pornhub is launching its own VPN service today with free and unlimited bandwidth. The VPN is supposed to help users avoid ISP throttling and geographic limitations. It’s also designed to let users transmit data anonymously without saving or collecting any of that data.<p>To get started, you download …

VPNs

This 27-year-old ex-Facebook engineer invented a super popular way to protect Mac PCs from hackers without Apple's help

A tiny security startup called Kolide is starting to make waves within the computer security world.<p>It helps businesses dive into the guts of their employees' Macintosh computers to find all the sketchy things a hacker could use to break into a corporate network.<p>Kolide is on the radar because its …

Workstations

Starbucks Just Made a Huge Announcement That Will Change the Way It Does Business Forever

The concept isn't necessarily a bad idea. Sharing it with everyone was.<p>On Saturday, Starbucks dropped what may be the biggest policy change in its existence as a company:<p>It will now allow anyone--paying customer or not--to use its stores and restrooms, regardless of whether or not they make a …

Customers

After tens of thousands of pre-orders, 3D audio headphones startup Ossic disappears

After taking tens of thousands of crowdfunding pre-orders for a high-end pair of “3D sound” headphones, audio startup Ossic announced this weekend it is shutting down the company and backers will not be receiving refunds.<p>The company raised $3.2 million across Kickstarter and Indiegogo for their …

Crowd Funding

In Google we trust: But why?

In contrast to Facebook, which has seen its trustworthiness plummet, Google has won trust by delivering sherpa-like navigation through digital and …

Artificial Intelligence

Security vendors need to stop doing more harm than good

Opinion: What if the security industry operated under a basic tenet: "First, do no harm?"<p><i>Video: What security vendors can do to earn some …

Information Security

Build a realtime map using Kotlin

A basic understanding of Kotlin and Node.js is needed to follow this tutorial.<p>Just as the name implies, the aim of this article is to show the …

JavaScript

7 Jaw-Dropping Marijuana Statistics You Have to See to Believe

A newly released report projects robust growth for the cannabis industry over the next five years.<p>The marijuana industry is growing like a weed, and …

Cannabis

Bitcoin and Ether will likely be classed as assets under the law and that could trigger more volatility in the crypto markets

This hot-button question keeps coming at me on social media and from clients in the Email so I'd like to present my opinion here in this open forum.<p>There are a few concurrent stories right now that hinge on this. There is a rising speculation that the SEC could start calling some cryptos securities …

Cryptocurrency

UK cell giant EE left a critical code system exposed with a default password

The code repository contained two million lines of code across EE's website and customer portal.<p>EE, the largest cell network in the UK with some 30 …

Information Security

Microsoft Windows, Apple macOS, Linux, BSD: All hit by same 'serious' security flaw

OS and hypervisor makers patch flaw that attackers could use to crash systems or read data from memory.<p><i>Video: The 2013 flaw that's still used to turn</i> …

Information Security

IBM Employees Can't Use Removable Storage Anymore

USB sticks, SD cards, and portable hard drives are all very useful, but now banned at IBM.<p>PCMag reviews products independently, but we may earn …

Portable

Da rana Pepe aos incel: a ascensão da extrema direita norte-americana em internet

A <i>alt-right</i> pegou muitos de nós de surpresa. Estávamos acostumados a um discurso direitista muito diferente: rígido, necrosado, defensor da ordem e …

O drama do Brasil descrito há quatro séculos

A tragédia de "Coriolano" é, no fundo, a tragédia daqueles que, reféns de orgulho ou ideologia, são incapazes de compreender a natureza ambivalente …

BPF desembarcando no Kernel Linux

O Berkeley Packet Filter, mais conhecido apenas como Packet Filter —ou ainda PF— desembarca para o kernel Linux. É um esforço de grandes players como …

Lançado o GIMP 2.10

6 anos após o lançamento da versão 2.8, surge a 2.10 do editor de imagens livre GIMP.Apesar da transição para a GTK3 não ter ocorrido, diversas novas …

Kernel série 5.x

O site The Register[1] noticiou que a série 5.x está a caminho e a série 4.x terá um fim em breve, em especial na versão 4.17 que se encerra nesta …

Behind the scenes with the hackers who unlocked the Nintendo Switch

"The best way to get a chip security audited is to put it in a game console"<p>For end users, Monday's public disclosure of the Fusée Gelée exploit will …

Information Security

T-Mobile and Sprint will merge to create a 5G powerhouse

After years of on-again, off-again talks, it's official: T-Mobile and Sprint have announced plans to merge. The all-stock, $26 billion deal values Sprint at $59 billion (the combined company would be worth $146 billion) and will give T-Mobile the reins, with the carrier's John Legere serving as CEO …

Telecoms

Bitcoin is the greatest scam in history

It’s a colossal pump-and-dump scheme, the likes of which the world has never seen.<p><i>This is a contributed post by Bill Harris, former CEO of Intuit and founding CEO of PayPal and Personal Capital.</i><p>I’m tired of saying, “Be careful, it’s speculative.” Then, “Be careful, it’s gambling.” Then, “Be …

Cryptocurrency

Introduction to Unit Testing with Java

We all have been there: we spent so much time into a project, we make sure to run each and every possible scenario we might think off in order to …

Software Development

Desative os anúncios de Facebook que têm base no seu comportamento online

Em meio à polêmica sobre o uso de dados de usuários no Facebook, Mark Zuckerberg alegou que as pessoas não gostam de ser apresentadas com propagandas …

​Microsoft releases its first Linux product

For the first time, Microsoft has released its own Linux kernel in a new Linux-based product: Azure Sphere.<p>read this<p>After testing the waters for …

Open source's big German win: 300,000 users shift to Nextcloud for file sharing

Germany's federal government settles on an open-source collaboration system for employees.<p><i>Video: Microsoft plans to lure Linux distribution</i> …

Windows 10

DNS is about to get into a world of trouble with GDPR

ICANN, the group in charge of the Domain Name System, is in a deadlock with the European Union's General Data Protection Regulation over the WHOIS …

Jeff Bezos admits Amazon has 'the weirdest meeting culture you will ever encounter'

If you go to work as an executive at Amazon — no matter what your expertise — you'll be required to become a good writer, and a good reader, in order to lead the meetings necessary to do your job.<p>And Amazon CEO Jeff Bezos admits that this will likely be "weird," he explained during an onstage …

Jeff Bezos

“Drupalgeddon2” touches off arms race to mass-exploit powerful Web servers

Bug patched in March is still being exploited to take full control of servers.<p>Attackers are mass-exploiting a recently fixed vulnerability in the …

Information Security